Describe the term: Authentication, Authorization and Integrity
[3 marks]What is data leakage? Explain Types of data leakage.
[4 marks]Explain Shannon’s general secrecy system with a block diagram
[7 marks]What is Differential Privacy? Give it’s benefits.
[3 marks]Encode a binary word 11001 into the even parity hamming code.
[4 marks]What is the difference between Encryption and Masking? Which is better for data security?
[7 marks]How does a side channel attack work? What attacks use side channel analysis?
[7 marks]Differentiate :Data Encryption Vs. Data Masking
[3 marks]What is Lightweight Cryptography? Give its advantages and disadvantages.
[4 marks]Abit stream 10110 is transmitted using the standard CRC method. The code generator is 1101. What is the actual bit string transmitted?
[7 marks]What is Parity and How it Works?
[3 marks]Explain Diffie-Hellman algorithm
[4 marks]What is Public Key Infrastructure? Explain Digital Certificate with diagram.
[7 marks]What is Secret Sharing?
[3 marks]Explain Key Management in Cryptosystem.
[4 marks]Explain Caesar Cipher with example.
[7 marks]What is Elliptic Curve Cryptography?
[3 marks]Explain Symmetric Cipher Model.
[4 marks]Explain provable security and authentication. Is RSA provably secure? Justify.
[7 marks]Explain secret sharing and its importance in network security.
[3 marks]What is Network Forensics? Write Processes Involved in Network Forensics and Challenges in Network Forensics.
[4 marks]Explain Passive Attack and its types.
[7 marks]Explain perfect secrecy in the symmetric cipher model.
[3 marks]Explain the difference between uncertainty and risk for a probability distribution.
[4 marks]What Is Quantum Cryptography? How does it works?
[7 marks]